Debate» Software vendors should “partner” THREAT OF
with pirates to ﬁght unlicensed software use.
FOR Independent software vendors AGAINST Microsoft advocates policies What is it?
(ISVs) have unsuccessfully that ensure innovators, and In December, yet another
fought against illegal use of their those willing to invest in the zero-day vulnerability
apps using current technology- development of new technolo- surfaced in Adobe Reader
based approaches, such as DRM gies are rewarded fairly for their and Acrobat and was the
and hardware dongles, as well efforts, according to the rights fourth zero-day in 2009 to
as legal countermeasures and they have by rule of law. affect these products.
Victor take-down notices. Technology Microsoft’s Genuine Software
DeMarines countermeasures are overcome GM for worldwide Initiative (GSI) focuses on How does it work?
VP of products, anti-piracy,
V.i. Labs through reverse engineering by Microsoft investments across education, Apart from rendering PDF
an adept cracking community engineering and enforcement. ﬁles, the programs also
ing underground ﬁle-sharing sites and social tecting consumers and resellers from piracy. for Acrobat API, which
networks that prevent centralized monitoring. Piracy is not a mere nuisance. It is not pos- allows a PDF document to
These piracy channels have efﬁciency in the sible for the average consumer to distinguish execute script in response
global distribution of apps through communica- between a “well-intentioned” and “unscru- to events. A so-called use-
tion processes. pulous” pirate, who is working illicitly, much after-free error, where an
ISVs should take advantage of the value of less whether they provide “safe counterfeit” or object is referenced and
information inherent in these piracy channels, something that may cause irreparable damage used after having been
including otherwise unaccounted for demand, to their data or systems. deleted in memory, exists
use and adoption of their apps. These trends Each year, the software industry, its partners, when executing the “Doc.
can paint a picture of overuse by existing cus- and consum